cybersecsi / houdini
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
β1,209Updated 10 months ago
Related projects β
Alternatives and complementary repositories for houdini
- A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.β546Updated this week
- π¦π Awesome list of secrets in environment variables π₯οΈβ865Updated 2 years ago
- My cheatsheet notes to pentest AWS infrastructureβ655Updated 2 years ago
- π A curated list of awesome Docker security resourcesβ641Updated last week
- Automating situational awareness for cloud penetration tests.β1,930Updated 3 weeks ago
- π‘οΈ Awesome Cloud Security Resources βοΈβ2,078Updated this week
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!β2,006Updated 2 weeks ago
- API Security Project aims to present unique attack & defense methods in API Security fieldβ1,350Updated 8 months ago
- β564Updated last year
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assetsβ769Updated this week
- A curated list of awesome CI CD security resourcesβ523Updated last week
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.β1,706Updated this week
- Granular, Actionable Adversary Emulation for the Cloudβ1,819Updated this week
- Checklist for container security - devsecops practicesβ1,521Updated last year
- Ultimate DevSecOps libraryβ5,739Updated this week
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic lβ¦β2,582Updated 3 years ago
- Dangerously fast DNS/network/port scannerβ886Updated 2 years ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organizationβ1,903Updated 7 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,844Updated last year
- Automated Penetration Testing Reporting Systemβ798Updated this week
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.β1,942Updated 3 months ago
- a drop-in replacement for Nmap powered by shodan.ioβ2,900Updated 7 months ago
- A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.β385Updated 6 months ago
- Fully automated homelab from empty disk to running services with a single command.β8,201Updated 2 months ago
- Quickly discover exposed hosts on the internet using multiple search engines.β2,413Updated last week
- Vulnerable app with examples showing how to not use secretsβ1,232Updated this week
- Nosey Parker is a command-line program that finds secrets and sensitive information in textual data and Git history.β1,682Updated this week
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β1,354Updated 2 years ago
- Best practices for segmentation of the corporate network of any companyβ3,292Updated 8 months ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized enβ¦β1,124Updated 3 months ago